-
Notifications
You must be signed in to change notification settings - Fork 67
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Buffer Overflow and Insufficient Session Expiration #218
Comments
thx for opening an issue! |
There is an indirect dependency on |
The Line 673 in 9b84d9b
|
ok. We can probably address the PLP issue but I don't know what we'd do about gorilla unless there's a patched version now available to whatever dependency is bringing it in. |
It's not clear to me that this is a severe problem. Even if we were to always start with a smaller capacity, if the actual data size is very large (up to 2GB), growing the buffer could fail at some point. What's the difference between that kind of failure vs a failure to allocate that much capacity initially? Failing up front would be faster than failing after however many buffer reallocations and copies to grow it. |
sonatype-2023-1010 The github.com/microsoft/go-mssqldb package is vulnerable to Buffer Overflow attacks. The readPLPType() function in the types.go file uses the size defined by an RPC message for the read buffer instead of a fixed buffer size when handling PLP types. An attacker can exploit this behavior by supplying a specially-crafted message that would cause a large memory allocation leading to memory corruption, an application crash or other unexpected behavior.
sonatype-2021-4899 The gorilla/sessions package is vulnerable due to Insufficient Session Expiration. The library allows for the creation of session cookies with the NewCookieStore() function in store.go. However, there is no mechanism available for invalidating user sessions once they have been created in this way. The documentation instructs users to set the MaxAge attribute of a cookie to -1 using the MaxAge() function in order to invalidate the session associated with it. However, this does not invalidate the users session on the server. A malicious user who is able to retrieve the value of a users' session cookie through a Cross-Site Scripting (XSS) attack, a Man-in-the-Middle (MitM) attack, or by some other means, will be able to use that session cookie to impersonate the user even after that user has logged out.
The text was updated successfully, but these errors were encountered: